CVE-2024-6678
Sept. 18, 2024, 7:14 p.m.
8.8
High
Description
An issue was discovered in GitLab CE/EE affecting all versions starting from 8.14 prior to 17.1.7, starting from 17.2 prior to 17.2.5, and starting from 17.3 prior to 17.3.2, which allows an attacker to trigger a pipeline as an arbitrary user under certain circumstances.
Product(s) Impacted
Vendor | Product | Versions |
---|---|---|
Gitlab |
|
|
Weaknesses
CWE-290
Authentication Bypass by Spoofing
This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks.
*CPE(s)
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
a | gitlab | gitlab | / | / | / | / | community | / | / | / |
a | gitlab | gitlab | / | / | / | / | enterprise | / | / | / |
Tags
CVSS Score
CVSS Data
- Attack Vector: NETWORK
- Attack Complexity: LOW
- Privileges Required: LOW
- Scope: UNCHANGED
- Confidentiality Impact: HIGH
- Integrity Impact: HIGH
- Availability Impact: HIGH
View Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Date
- Published: Sept. 12, 2024, 7:15 p.m.
- Last Modified: Sept. 18, 2024, 7:14 p.m.
Status : Analyzed
CVE has had analysis completed and all data associations made.
More infoSource
cve@gitlab.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.